Morphemes are the smallest units that hold meaning in language or an element of a word such as –ing in walking.

Morphemes

Morphemes are the smallest units that hold meaning in language or an element of a word such as –ing in walking. They can not be divided further into any small parts that have meaning. Phonemes on the other hand are the smallest units of sound which are found in a language. These are small phonetic units found in a particular language that have the capability of completely changing the entire meaning of a particular word such as b in bat and c in cat in English. In English the word cat can not be broken down into small ideas that are based on the word. This means that “cat” is completely a sound of its own. On the other hand each and every letter in the word ”cat” corresponds to a particular sound which if put separately they can not be complete with each other. In English there are various cases where more than a single phoneme is in correspondence with a single morpheme. For example telephone contains two morphemes which are tele and phone and within the same words there are other several phonemes which are t, e, l, e, f, o, and n.

This paper will therefore identify some of the morphemes and phonemes which are found within some phrases.

Morphemes

Morphemes can be classified into two broad categories they are either free or bound. These two morpheme categories are mutually exclusive to each other. This therefore means that a particular morpheme can only belong to a particular category. So/me gentle /men dined at an economical restaurant. They found the service to be un /acceptable and wish/ed to ex/press their un/happiness to the man/age/ment. The manager was un/available, so they brought the left/overs home to their dog who resided in a dog/house in the back/yard. These phrases contain various morphemes, some of then are free while others are bound. These morphemes are so and me in some, gentle and man in gentleman, un and acceptable in unacceptable, wish and ed in wished, ex and press in express, un and happiness in unhappiness, man, age and ment in management, un and available in unavailable, left and overs in left overs, back and yard in backyard and lastly dog and house in dog house. Among the free morphemes are gentle,men,acceptable,wish,available,press,man,age,left,overs,dog,house,back, and yard. They are classified as free morphemes because each of the morphemes can exist and function as complete words with specific meanings independently.

The Bound morphemes on the other hand are so, me, ed, un, ment, ex .these morphemes are classified as bound since they form part of words and act as conjunctions with roots or even other free morphemes or other bound morphemes. For instance un is only found together with other morphemes so that it forms a word with meaning. Most of these morphemes are prefixes like ex, un and suffixes like –ed,-ment while others are cranberry morphemes which are neither prefixes nor suffixes such as so and me.

Phonemes

There are various phonemes found in English. There are close to forty phonemes found in English. The phrase “There was an old woman who swallowed a fly. I don’t know why she swallowed a fly. Perhaps she’ll die” contains various phonemes This can be represented in the IPA format as follows

/ðɛər/-there,/ wʌz/-was, /æn/-an, /oʊld/-old, /wʊmən/-woman, /swɒloʊ/-swallow, /flaɪ/-fly, /doʊnt/- don’t, /noʊ/-know, ,/ waɪ/-why, /ʃi/-she, /pərˈhæps/-perhaps, /ʃil/-she’ll, /daɪ/-die. Therefore all these words have particular phonemes in them which are represented.

Addressing the Increase in the number and Types of Computer Crimes

Addressing the Increase in the number and Types of Computer Crimes

THESIS: Laws must be passed to address the increase in the number and types of computer crimes.

Over the last twenty years, a technological revolution has occurred as computers are now an essential element of today’s society. Large computers are used to track reservations for the airline industry, process billions of dollars for banks, manufacture products for industry, and conduct major transactions for businesses because more and more people now have computers at home and at the office.

People commit computer crimes because of society’s declining ethical standards more than any economic need. According to experts, gender is the only bias. The profile of today’s non-professional thieves crosses all races, age groups and economic strata. Computer criminals tend to be relatively honest and in a position of trust: few would do anything to harm another human, and most do not consider their crime to be truly dishonest. Most are males: women have tended to be accomplices, though of late they are becoming more aggressive. Computer Criminals tend to usually be “between the ages of 14-30, they are usually bright, eager, highly motivated, adventuresome, and willing to accept technical challenges.”(Shannon, 16:2)

“It is tempting to liken computer criminals to other criminals, ascribing characteristics somehow different from ‘normal’ individuals, but that is not the case.”(Sharp, 18:3) It is believed that the computer criminal “often marches to the same drum as the potential victim but follows and unanticipated path.”(Blumenthal, 1:2) There is no actual profile of a computer criminal because they range from young teens to elders, from black to white, from short to tall.

Definitions of computer crime has changed over the years as the users and misusers of computers have expanded into new areas. “When computers were first introduced into businesses, computer crime was defined simply as a form of white-collar crime committed inside a computer system.”(2600: Summer 92,p.13)

Some new terms have been added to the computer criminal vocabulary. “Trojan Horse is a hidden code put into a computer program. Logic bombs are implanted so that the perpetrator doesn’t have to physically present himself or herself.” (Phrack 12,p.43) Another form of a hidden code is “salamis.” It came from the big salami loaves sold in delis years ago. Often people would take small portions of bites that were taken out of them and then they were secretly returned to the shelves in the hopes that no one would notice them missing.(Phrack 12,p.44)

Congress has been reacting to the outbreak of computer crimes. “The U.S. House of Judiciary Committee approved a bipartisan computer crime bill that was expanded to make it a federal crime to hack into credit and other data bases protected by federal privacy statutes.”(Markoff, B

13:1) This bill is generally creating several categories of federal misdemeanor felonies for unauthorized access to computers to obtain money, goods or services or classified information.

This also applies to computers used by the federal government or used in interstate of foreign commerce which would cover any system accessed by interstate telecommunication systems.

“Computer crime often requires more sophistications than people realize it.”(Sullivan, 40:4) Many U.S. businesses have ended up in bankruptcy court unaware that they have been victimized by disgruntled employees. American businesses wishes that the computer security nightmare would vanish like a fairy tale. Information processing has grown into a gigantic industry. “It accounted for $33 billion in services in 1983, and in 1988 it was accounted to be $88 billion.” (Blumenthal, B 1:2)

All this information is vulnerable to greedy employees, nosy-teenagers and general carelessness, yet no one knows whether the sea of computer crimes is “only as big as the Gulf of Mexico or as huge as the North Atlantic.” (Blumenthal,B 1:2) Vulnerability is likely to increase in the future. And by the turn of the century, “nearly all of the software to run computers will be bought from vendors rather than developed in houses, standardized software will make theft easier.” (Carley, A 1:1)

A two-year secret service investigation code-named Operation Sun-Devil, targeted companies all over the United States and led to numerous seizures. Critics of Operation Sun-Devil claim that the Secret Service and the FBI, which have almost a similar operation, have conducted unreasonable search and seizures, they disrupted the lives and livelihoods of many people, and generally conducted themselves in an unconstitutional manner. “My whole life changed because of that operation. They charged me and I had to take them to court. I have to thank 2600 and Emmanuel Goldstein for publishing my story. I owe a lot to the fellow hackers and fellow hackers and the Electronic Frontier Foundation for coming up with the blunt of the legal fees so we could fight for our rights.” (Interview with Steve Jackson, fellow hacker, who was charged in operation Sun Devil) The case of Steve Jackson Games vs. Secret Service has yet to come to a verdict yet but should very soon. The secret service seized all of Steve Jackson’s computer materials which he made a living on. They charged that he made games that published information on how to commit computer crimes. He was being charged with running a underground hack system. “I told them it was only a game and that I was angry and that was the way that I tell a story. I never thought Hacker [Steve Jackson’s game] would cause such a problem. My biggest problem was that they seized the BBS (Bulletin Board System) and because of that I had to make drastic cuts, so we laid of eight people out of 18. If the Secret Service had just come with a subpoena we could have showed or copied every file in the building for them.”(Steve Jackson Interview)

Computer professionals are grappling not only with issues of free speech and civil liberties, but also with how to educate the public and the media to the difference between on-line computer experimenters. They also point out that, while the computer networks and the results are a new kind of crime, they are protected by the same laws and freedom of any real world domain.

“A 14-year old boy connects his home computer to a television line, and taps into the computer at his neighborhood bank and regularly transfers money into his personnel account.”(2600: Spring 93, p.19) On paper and on screens a popular new mythology is growing quickly in which computer criminals are the ‘Butch Cassidys’ of the electronic age. “These true tales of computer capers are far from being futuristic fantasies.”(2600: Spring 93:p.19) They are inspired by scores of real life cases. Computer crimes are not just crimes against the computer, but it is also against the theft of money, information, software, benefits and welfare and many more.

“With the average damage from a computer crime amounting to about $.5 million, sophisticated computer crimes can rock the industry.”(Phrack 25,p.6) Computer crimes can take on many forms. Swindling or stealing of money is one of the most common computer crime. An example of this kind of crime is the Well Fargo Bank that discovered an employee was using the banks computer to embezzle $21.3 million, it is the largest U.S. electronic bank fraud on record. (Phrack 23,p.46)

Credit Card scams are also a type of computer crime. This is one that fears many people and for good reasons. A fellow computer hacker that goes by the handle of Raven is someone who uses his computer to access credit data bases. In a talk that I had with him he tried to explain what he did and how he did it. He is a very intelligent person because he gained illegal access to a credit data base and obtained the credit history of local residents. He then allegedly uses the resident’s names and credit information to apply for 24 Mastercards and Visa cards. He used the cards to issue himself at least 40,000 in cash from a number of automatic teller machines. He was caught once but was only withdrawing $200 and in was a minor larceny and they couldn’t prove that he was the one who did the other ones so he was put on probation. “I was 17 and I needed money and the people in the underground taught me many things. I would not go back and not do what I did but I would try not to get caught next time. I am the leader of HTH (High Tech Hoods) and we are currently devising other ways to make money. If it weren’t for my computer my life would be nothing like it is today.”(Interview w/Raven)

“Finally, one of the thefts involving the computer is the theft of computer time. Most of us don’t realize this as a crime, but the congress consider this as a crime.”(Ball,V85) Everyday people are urged to use the computer but sometimes the use becomes excessive or improper or both. For example, at most colleges’ computer time is thought of as free-good students and faculty often computerizes mailing lists for their churches or fraternity organizations which might be written off as good public relations. But, use of the computers for private consulting projects without payment of the university is clearly improper.

In business it is the similar. Management often looks the other way when employees play computer games or generate a Snoopy calendar. But, if this becomes excessive the employees is stealing work time. And computers can only process only so many tasks at once. Although considered less severe than other computer crimes such activities can represent a major business loss.

“While most attention is currently being given to the criminal aspects of computer abuses, it is likely that civil action will have an equally important effect on long term security problems.”(Alexander, V119) The issue of computer crimes draw attention to the civil or liability aspects in computing environments. In the future there may tend to be more individual and class actionsuits.

CONCLUSION

Computer crimes are fast and growing because the evolution of technology is fast, but the evolution of law is slow. While a variety of states have passed legislation relating to computer crime, the situation is a national problem that requires a national solution. Controls can be instituted within industries to prevent such crimes. Protection measures such as hardware identification, access controls software and disconnecting critical bank applications should be devised.

However, computers don’t commit crimes; people do. The perpetrator’s best advantage is ignorance on the part of those protecting the system. Proper internal controls reduce the opportunity for fraud.

BIBLIOGRAPHY

Alexander, Charles, “Crackdown on Computer Capers,” Time, Feb. 8, 1982, V119.

Ball, Leslie D., “Computer Crime,” Technology Review, April 1982, V85.

Blumenthal,R. “Going Undercover in the Computer Underworld”. New York Times, Jan. 26,

1993, B, 1:2.

Carley, W. “As Computers Flip, People Lose Grip in Saga of Sabatoge at Printing Firm”. Wall

Street Journal, Aug. 27, 1992, A, 1:1.

Carley, W. “In-House Hackers: Rigging Computers for Fraud or Malice Is Often an Inside Job”.

Wall Street Journal, Aug 27, 1992, A, 7:5.

Markoff, J. “Hackers Indicted on Spy Charges”. New York Times, Dec. 8, 1992, B, 13:1.

Finn, Nancy and Peter, “Don’t Rely on the Law to Stop Computer Crime,” Computer World,

Dec. 19, 1984, V18.

Phrack Magazine issues 1-46. Compiled by Knight Lightning and Phiber Optik.

Shannon, L R. “THe Happy Hacker”. New York Times, Mar. 21, 1993, 7, 16:2.

Sharp, B. “The Hacker Crackdown”. New York Times, Dec. 20, 1992, 7, 18:3.

Sullivan, D. “U.S. Charges Young Hackers”. New York Times, Nov. 15, 1992, 1, 40:4. 2600: The Hacker Quarterly. Issues summer 92-Spring 93. Compiled by Emmanuel G

Cases where the president has taken the U.S. troops without congressional authorization (2)

Cases where the president has taken the U.S. troops without congressional authorizationName:

Course:

Instructor

Date

Cases where the president has taken the U.S. troops without congressional authorizationUnder the constitution, the president has the power to veto legislations, command the armed forces, convene and adjourn congress, ask for the opinions on cabinet which should be written, grant reprieves and pardons, and receive and dismiss ambassadors. However, in the second paragraph of Article II, Section 2, the constitution provides that the President shall have Power, by and with the Advice and Consent of the Senate to make Treaties, provided two thirds of the Senators present concurs with the negotiations of the treaty in question CITATION Cur14 l 2057 (Bradley & Goldsmith, 2014). Furthermore, the president shall nominate, and by and with the advice and consent of the Senate, he shall appoint ambassadors, other public ministers and consuls, judges of the Supreme Court, and all other officers of the United States, whose appointments are not included in the mentioned categories above, and which shall be recognized by law. The president basically depends on the senate in making major decisions such as legislations. CITATION Art l 1033 (Article II , n.d.) The president’s power to take the U.S. forces into situations of hostility is limited under the constitution CITATION Cur14 l 2057 (Bradley & Goldsmith, 2014); however, since the founding of the republic, successive presidents have used military force without congressional authorization over two hundred times. This paper will focus on the cases in which the president has taken the U.S. troops into a foreign military situation without congressional Authorization and the legality of the president’s actions for each case presented.

Firstly, is the quasi war between the United States of America and France between 1798 and 1800. John Adams was the president during this war which is viewed to have helped shape the American foreign policy. The American and the French government conflicted over the signing of a supposed peace establishing treaty with England. According to the French, this treaty would violate the 1778 Treaty of Alliance made with the Americans during the American Revolution. Amidst the mayhem, the American government also failed to make debt payments to the French on the basis that the current government was not the government that had signed the treaty. Following this, the French seized Americas merchant ships and upon intervention by the U.S. government the French made so much demands that America could not meet. The U.S. Navy went into war to protect America which was considered to be under attack. The president in this case was obliged to make a decision that favored America. The president’s actions were in line with the best interests of the nation which is legal. CITATION Kat17 l 1033 (Eschner, 2017)Secondly is the Utah Expedition between 1857 and 1858 which was basically an armed confrontation between the United States armed forces and the Mormon settlers in the Utah territory. This confrontation occurred during the time of President James Buchanan who attempted to use force with the Mormons in the Utah territory and ended up stirring a rebellion. American government was particular against the polygamy nature of the Mormons and considered it un-American like. Troops were sent in to install the typical American government and establish law and order. The president’s action was aimed at uphold law and order throughout its jurisdictions and the president was just doing his job which is substantially legal because that is what a ruler is expected to do. CITATION Bla18 l 1033 (Stilwell, 2018)Thirdly are the Indian wars which basically broke out because Indians acquired Christianity and civilization and thus became a threat to the Native Americans. The war was based on racism and religious backgrounds that disguised Indians as barbarians and child killers in the eyes of the Native Americans. The Indians on the other viewed George Washington as a town wrecker because the attack had been through his orders. The last war between the Indians and the American government happened in 1812 under the leadership of Andrew Jackson. In the Indian wars, the president had mobilized the troops to fight for the rights of the Native Americans which were then considered the right thing to do. A people of a different race could not have possible been allowed to take away what belonged to the Native Americans. Legally, the president is obliged to protect the citizens from any kind of invasion within his jurisdiction. CITATION And09 l 1033 (Gardner, 2009)The other war is patriotic war of 1837 with Canada. The patriots who consisted of the Irish and United States citizens in the upper part of Canada and the United States were determined to detach the peninsula lying between the Michigan frontier and the Niagara frontier in Canada and append it to the United States. The patriots marched to make their demands which led to a plot to capture of the United States Arsenal at Dearborn and seizure of its arms. To contain this situation, the Michigan Militia was assigned to watch over Arsenal. More defenses were expended later since the frontier troubles increased. The president in this case acted to fulfill the law of maintaining order within its territories which is a legal thing to do since the patriots were cause unrest and even attacked a militia base in Michigan. CITATION The l 1033 (ThePatriot War, n.d.)Lastly, the naval skirmishes in Sumatra in the 1830s; was about the American expeditions launched against pirates in Indonesia. The American traders who had established their trading links throughout the Far East faced threats which led to the making agreements with the local leaders. This happened during the time of Andrew Jackson and he was so upset upon hearing this news. In reaction, he sent out troops to ensure the American traders were safe during their business operations and this led to the first expedition. The president acted in order to protect its citizens which is utterly the right thing every ruler would do and also legal. CITATION Ant16 l 1033 (Vanner, 2016)In summary, as much as the president acted without authorization from the congress, his actions were utterly for the best to safeguard the interests of the United States. By expending the troops to war, the foreign policy was enhanced particularly in the case of the war with the French.

References

BIBLIOGRAPHY Akkad, O. E. (2017). American War. ‎Alfred A. Knopf.

Article II . (n.d.). Retrieved from Ineractive Constitution : https://constitutioncenter.org/interactive-constitution/articles/article-ii

Bradley, C. A., & Goldsmith, J. L. (2014). Foreign relations law : cases and materials. New York : Wolters Kluwer Law & Business.

Eschner, K. (2017, July 7). This Unremembered US-France ‘Quasi War’ Shaped Early America’s Foreign Relations. Retrieved from Smithsonian.com: https://www.smithsonianmag.com/smart-news/unremembered-us-france-quasi-war-shaped-early-americas-foreign-relations-180963862/

Gardner, A. G. (2009). The Indian War. Colonial Williamsberg.

Last Name, F. M. (Year). Article Title. Journal Title, Pages From – To.

Last Name, F. M. (Year). Book Title. City Name: Publisher Name.

Stilwell, B. (2018, September 19). That time Mormons accidentally went to war with the US Army . Retrieved from We Are the Mighty: https://www.wearethemighty.com/history/utah-mormon-war-with-army

ThePatriot War. (n.d.). Retrieved from Michigan Department of Military and Veterans Affairs: https://www.michigan.gov/dmva/0,4569,7-126-2360_3003_3009-16956–,00.html

Vanner, A. (2016, January 26). The US Navy’s Sumatran Expeditions 1832 & 1838 . Retrieved from Dawlish Chronicles: http://dawlishchronicles.blogspot.com/2016/01/the-us-navys-sumatran-expeditions-1832.html

Case Study

Case Study:

Southwestern University: F The recent success of Southwestern University’s football program is causing SWU’s president, Joel Wisner, more problems than he faced during the team’s losing era in the early 1990s. For one thing, increasing game-day attendance is squeezing the town of Stephenville, Texas and the campus. Complaints are arising over parking, seating, concession prices, and even a shortage of programs at some games. Dr. Wisner, once again, turns to his stadium manager, Hank Maddux. This time, he needs a guaranteed revenue stream to help fuel the stadium expansion. One source of income could easily be the high-profit game programs. Selling for $6 each, programs are a tricky business. Under substantial pressure from Wisner, Maddux knows he has to ensure that costs are held to a minimum and contribution to the new expansion maximized. As a result, Maddux wants the programs for each game to be purchased economically. His inquiries have yielded two options. A local Stephenville printer, Sam Taylor of Quality Printing, has offered the following discount schedule for the programs and game inserts: Programs Weekly Game Detail Inserts 10,000 to 30,000 $2.00 each 10,000 to 30,000 $1.00 30,000 to 60,000 $1.90 each 30,000 to 60,000 $0.95 60,000 to 250,000 $1.80 each 60,000 to 250,000 $0.90 250,000 and up $1.50 each 250,000 and up $0.85 As a second option, however, First Printing, owned by Michael Shader, an S.W.U. alumnus in Ft. Worth, will do the job for 10% less as a favor to help the athletic department. This option will mean sending a truck to Ft. Worth to pick up each order. Maddux estimates that the cost of each trip to Ft. Worth will be $250. Maddux’s other major problem is he is never sure what the demand for programs will be. Sales vary from opponent to opponent and how well the team is doing that year. However, he does know that running out is a very bad idea. This football team is not only expected to make money for SWU, but it is also entertainment. This means programs for all who want them. With the new facility, attendance could be 60,000 for each of the five home games. And two of every three people buy a program. In addition to the programs, Maddux must purchase the inserts for each game. The inserts have information about the opposing team, photos of the expected starters, and recent game statistics. The purchasing issue is the same for inserts, except inserts will be purchased separately for each game and are a total loss after the game. The carrying cost, because inserts are to be delivered just as they are needed, should be nominal; he estimates 5%. The other costs and the same discount schedule apply, but the inserts only cost half as much because they are much smaller. First Printing will give the same 10% discount on the inserts. Givens: Annual demand is 300,000 (60,000 per game times 5 games) Set-up cost for programs is $1,000.00 Holding cost is 40%

DISCUSSION QUESTIONS 1. With whom should Maddux place the order for the programs, and how many should he order each time? 2. With whom should Maddux place the order for the inserts, and how many should he order each time? 3. What is Maddux’s total cost for programs with inserts for the season? 4. What other program management opportunities might Maddux pursue?

Solution:

1. With whom should Maddux place the order for the programs and how many should he order each time?

Answer:

D = 60000 * 5 * 2/3= 200000

H = 0.5 * unit price

S quality printing = 100

S first printing = 100 + .9*(200) = 280

For quality printing

Q = √2DS / IP

Q1 = √2(200000)(100) / 0.5*5 = 4000

Q 2 = √2(200000)(100) / 0.5*1.80 = 6667

Q3 = √2(200000)(100) / 0.5*1.70 = 6860

Q4 = √2(200000)(100) / 0.5*1.60 = 7071

Q4 = √2(200000)(100) / 0.5*1.40 = 7559

Q1 = 6928

Q2 = 11547

Q3 = 30000

Q4 = 60000

Q5 = 250000

Annual Product cost = Demand * unit price

Annual order cost = Demand* setup cost/order quantity

Annual holding cost = Order quantity * holding cost / 2

Number Unit Price Order quantity Annual Product cost Annual order cost Annual holding cost Total

1 5.00 4000 1000000 5000 5000 5000

2 1.80 10000 360000 2000 4500 366500

3 1.70 30000 340000 666.67 12750 353416.67

4 1.60 60000 320000 333.33 24000 344333.33

5 1.40 250000 280000 80 875000 367580

Order quantity of 60000 will minimize total cost to 344333.33

For first printing, Q = √2(200000)(280) / 0.5*5 = 6693

Total cost = Setup cost + holding cost + product cost

= 200000/6693 * 280 + 6693 / 2 * (0.5*5.00) + 6693*5

= 50198.20

So the order for the programs should be placed at quality printing as ordering quantity of 60000 each time

2. With whom should Maddux place the order for the inserts and how many should he order each time?

D = 60000

H = 0.5 * unit price

S quality printing = .5*100 = 50

S first printing = 0.5(100 + .9(200)) = 140

For quality printing

Q = √2DS / IP

Q1 = √2(60000)(50) / 0.5*2.5 = 12649

Q 2 = √2(60000)(50) / 0.5*.90 = 21082

Q3 = √2(60000)(500) / 0.5*.85 = 21693

Q4 = √2(60000)(50) / 0.5*.80 = 22361

Q4 = √2(60000)(50) / 0.5*.70 = 23905

Q1 = 6928

Q2 = 11547

Q3 = 30000

Q4 = 60000

Q5 = 250000

Annual Product cost = Demand * unit price

Annual order cost = Demand* setup cost/order quantity

Annual holding cost = Order quantity * holding cost / 2

Number Unit Price Order quantity Annual Product cost Annual order cost Annual holding cost Total

1 2.50 6928 150000 433.03 433 150866.03

2 0.90 11547 54000 259.81 259.81 54519.62

3 0.85 30000 51000 100 637.50 51737.50

4 0.80 60000 48000 50.00 1200.00 49250

5 0.70 250000 42000 12.00 4357 46387

Order quantity of 250000 will minimize total cost to 46387

For first printing, Q = √2(60000)(140) / 0.5*2.50 = 11593

Total cost = Setup cost + holding cost + product cost

= 60000/11593 * 140 + 11593 / 2 * (.05*2.50) + (11593 * 2.50)

= 30431.64

3.What is Maddux’s total cost for programs with inserts for the season?

The total cost for the program for the inserts for this season will be about $ 374764.97

4. What other program management opportunities might Maddux pursue?

Answer:

Maddux focuses on purchasing the game economically with a strong focus on quality printing, there are different program that maddux can pursue different programs, 10000 to 30000, 30000 to 60000, withna strong focus on first printing, Maddux. Muddux has high carrying cost because he lacks a good place to store the programs. He can’t put them in the office, or store them down in the maintenance department, where they may get dirty and damaged. So, the compnay needs to focus on reducing the carrying cost so as to have profits. Maddux needs to focus on inserts as well for the programs, so as to increase its revenue and sales.

Most Abortions Are Moral

Most Abortions Are Moral?

Are abortions moral? This question has been stirring up debate between those who favor abortion (liberals / Pro-Choice) and those against it (conservatives / Pro-Life). Liberals believe that the woman should not only be able to choose matters that concern her body, but that a fetus is not a person. The conservatives argue that the fetus is a person from conception. However, when it comes down to legality, the Constitution states that a woman is able to make the choice for herself without government intervention on the basis of the right of privacy.

In Jane English’s article she shows that there are exceptions to every rule concerning why and when abortion is moral or immoral. For example, conservatives say abortion is immoral because it kills potential life but there are justifiable killings. Liberals think since a fetus is not a person it is a justifiable act to kill it. But during the final stages of pregnancy the fetus closely resembles a person.

What if a fetus is a person? Conservatives will consider abortion to be infanticide. If Judith Jarvis Thompson is able to prove that killing is always wrong, she can conclude whether or not abortion is immoral. However, there are justifiable killings. She uses self-defense as an example along with some scenarios. The defense may only equal the threatened injury in severity and should only be the minimum necessary to deter the attacker. Therefore, if the birth of a child poses threat to the mother, abortion may be considered as self-defense. A second scenario says to avoid an attack all together, suggesting to practice abstinence. A third scenario says use protection against the attacker, implying to use birth control. A fourth scenario says you may kill the attacker only if there is certainty he will kill you. Therefore, abortion is “acceptable” if it will save the woman’s life.

What if a fetus is not a person? Since a fetus is considered not to be a full-fledged person, conservatives fear liberals will treat the fetus any way desired hence the debate on abortion. However, when comparing a fetus to an animal, for example, the mistreatment of an animal can result to harsh punishment. Because animals don’t have the same rights as people do, that doesn’t suggest we tolerate the abuse.

When is a fetus actually considered a person? Mary Anne Warner says in order to be labeled a “person” he/she should have the capacities for reasoning, self-awareness, and complex communication skills. Baruch Brody argues brain waves, Paul Ramsey claims a certain gene structure, and Michael Tooley suggests having the concept-of-self distinguishes a fetus from a person. Biological, psychological, rationality, social, and legal factors are also considered to make a distinction between a fetus and a person.

When does a fetus go from a non-person to a person? A fetus’ similarities to a newborn is quite significant during the ending weeks of pregnancy, thus any careless treatment would be immoral. In the early weeks of pregnancy, right after conception, a fetus does not resemble a person enough for abortion to be considered infanticide or immoral.

In conclusion, English says “whether a fetus is a person or not, abortion is justifiable early in pregnancy to avoid modest harms and seldom justifiable late in pregnancy except to avoid significant injury or death” (449 C/D).

Upon reading this article, I was never completely certain about how I felt about abortion. After analyzing English’s views, alongside Thompson, Warner, Brody, Tooley, and Ramsey, I was easily able to come to my own conclusion.

Because I never knew the facts and technicalities of abortion, I was always hesitant to have a distinctive “yes” or “no” answer to whether abortion is immoral. In addition, I was lazy enough to ignore that this was ever even an issue. But somehow I hastily just “decided” that abortion was wrong. Before I read English’s article I read the following statistics that further implemented my decision that abortion is, indeed, immoral:

In Brazil, forty thousand women die each year because of blotched abortions. (449 D)

The United States have three times as many abortions per group as does England, Sweden, or the Netherlands.

Forty-two percent of pregnant women have an abortion in the United States. The average Russian woman has seven abortions during her lifetime. (450 A)

The structure of English’s article was designed well enough for me to focus on the important points of the topic. Agreeing with English that this will forever be an unsettled issue, important details and suggestions were addressed that made the decision that more difficult.

For instance, I never considered the fact that there are justifiable killings. I never even considered the feelings of the lives involved. My sole focus was that not only having a child was a blessing, but the pregnancy was as well. I ignorantly overlooked that all women don’t want to have children, and that the process could potentially be harmful or life threatening to the woman. Therefore, abortion was looking “less immoral.” After reading the self-defense comparisons, however, I was even more confused. If the woman did not want to have a child, she should have used birth control. Practicing abstinence was a good alternative for her as well.

The turning point came when biological factors were addressed. With that, I was finally able to make a decision wisely. Discussed were the stages during pregnancy and the condition of the fetus during each stage. I knew that a fetus least resembled a person during the early weeks of pregnancy apposed to the ending weeks, but that obvious knowledge slipped my mind completely. Once supporting the conservative side without any sensible understanding or reasoning, I can proudly say I have done some research and made a decision. I am neither a liberal nor conservative. Agreeing with English, there are appropriate times and reasons to abort and to not. Abortion is permissible during the early weeks of pregnancy if it is in the best interest of the woman or people around her. During the middle stages of pregnancy, abortion is only permissible when the continuing pregnancy or labor will cause threat to the woman’s well being. During the final stages of pregnancy abortion is immoral unless to save the woman from severe injury or death.

“A newly fertilized ovum, a newly implanted clump of cells, is no more a person than an acorn is an oak tree…opponents of abortion commonly spend most of their time establishing that the fetus is a person, and hardly any time explaining the step from there to the impermissibility of abortion.”Jane English (450 D/E)

Bibliography:

n/a

Adhesive Bonding in the aircraft and automotive industry

Adhesive Bonding in the aircraft and automotive industry

Adhesive bounding of aluminum components in the aircraft and automotive industry are rapidly replacing many conventional methods of joining two parts togheter. Adhesives bonding is a process where a monomer compound is applied in between joints and is chemically allowed to transform into complex long chained polymers which interlock the mating parts by inter-atomic bounding and diffusion of the adhesive into the adherents. In most common uses, bonds are permanent, such as the thermosetting adhesives, and require machining in order to separate the mating parts. In other cases, the adhesive bond might be directly related to the operating temperature, as in thermoplastic adhesives, or may contain natural resins and form an elastic bond such as elastomeric adhesives. Adhesives are mostly limited to shear stress applications due to their relatively low peel and creep capabilities and require far more surface area to form a joint then conventional methods, however, their benefits in weight reduction and enhancing ergonomics, as well as their still fairly inexpensive and ability to function in a wide range of environments, are attractive traits which may influence a designer to select such a process.

Adhesives have been long known as the oldest means of joining two parts togheter. In fact, archeological evidences has been found showing the use of natural resins by early man to fasten arrows and spear heads to shafts (3, 170). They also found there first structural use well over three thousand years ago in the construction of the Tower of Babel ( 9, 3). However, it wasn’t until the second World War where great advances where made in structural adhesive bonding which applied to metal to metal structures. Redux, an adhesive conceived in England, was the first ever adhesive used in considerable proportion on the lightest fighter plane of that time, the Mosquito. Following in it’s allied foot steps, the Americans also adopted this process to produce the most effective aircraft of the war, the De Havilland Hornet which used the adhesive to bond the aluminum extrusions to the capped wing spars (4, 41).

Adhesives have since grown considerably and since no one universal adhesive exists up to date, the boundaries are limitless. They can be found in mostly all types of industries, from high tech aerospace to dishwashing machines, and are more and more, replacing conventional ways of fastening joints, namely mechanical fasteners and welding process.

In most cases, monomers are applied to it’s adherent (part to be jointed) and are turned into polymers, which are long chain type molecules, by means of diverse catalyst ranging from heat, pressure or some other chemical compound all depending on the type of adhesive used.

The reason why the bond takes place between the mating surfaces however has taken different theories over the past years. The three most common, principle of diffusion, principle of mechanical adherence and the principal of inter-atomic bonding have been well more developed than other explanations of why adhesive bonds occur.

The diffusion principle states that at polymerization, some of the molecules diffuse in the adherent and consequently, some molecules of the adherent diffuse into the adhesive in order to form a solid joint. The mechanical principal states that, the imperfections on the wetted surface of the adherent serve as to grip the adhesive when it turns into it’s solid polymer state and takes advantage of these imperfections to establish a solid bond. However, this might not help in explaining why perfectly strong bonds are also possible on highly polished surfaces. The third and most generally accepted theory attributes the bonding forces to the fact of the sharing of valence electrons between the newly formed polymer and the adhered material. Some may like to contribute all three factors working togheter as the proper definition of the bonding process( 3, 170) .

Adhesives may be categorized in three groups, thermosets, thermoplasts or elastomers.

Thermosets such as phenolics, epoxies and ureas are adhesives capable of withstanding high shear stresses and are capable of maintaining their properties for a wide range of temperatures. Once cured, machining or extremely high temperatures are required in order to break the formed bond and are irreversible processes. Contrarily, thermoplasts adhesives such as polyvinyls, acetates or acrylics have bond strength variation which is directly temperature dependent and for which at low temperatures, the bond gets stiff and brittle, but at high temperatures, ductile and elastic bonds occur. The third and last classification are elastomers which are generally made of natural or synthetic rubbers and latexes which are highly ductile and deformable adhesives at temperatures ranging close to room temperature ( 1, 402).

Most adhesives are furthermore classified under its ability to cover the entire surface of the mating parts, termed wetting ability ( 8,5). The Washburn equation is generally applied in order to classify the wetting property of the adhesive and is given by:

t = (2h/gcosq) * x2/rwhere

t : rate of filling irregularities

x : length of irregularity

r : capillary radius

h,g : viscosity and surface tension

q : contact angle between adhesive and substrate

Although the basic application are quite commonly simple, where most adhesives today are still spatula applied, automation is quite common and not such a daunting task to perform. The challenge lies in the preparation of the surfaces to be bonded as well as the study of the optimal curing times and temperatures required to obtain the required bonding strengths.

All parts require extensive cleaning with the use of solvents to eliminate any dust or grease deposit, which may interfere with the bonding process. Metals with oxide films are usually grounded and aluminum alloys pickled in alkali baths at temperatures of 170oF up until 10 minutes in order to clean and roughen the surface for the adhesive. Bare hands should never come into contact with the surfaces to be bonded as they will re-introduce grease to the surfaces to be mated (1, 417). As for curing temperatures and times, each vary depending on the type of adhesive used and the required bond strength sought ( 6, 1054). The most common use of adhesives is in shear bearing applications due to their poor resistance to peel, cleavage and tensile stresses (6, 1056).

This is where the challenges arise for the engineer who must design or modify an existing joint in order to maximize the load in a shear plane direction. Although they are limited to these applications, a well-designed joint may sustain an impressive amount of stress. However, most load bearing structural adhesives may have quoted performances rated as high as 50% of their ultimate tensile strength, but as a general rule of thumb, these materials should never be loaded more than 10% of the rated capabilities, which make designers skeptical in using adhesives for long term use applications ( 7, 5 ).

Another problem arises at selection of the adhesive since no universal adhesive exist, each adhesive has its own characteristics for which it may perform at better operating conditions then others and therefor, a quite profound knowledge of the different types of adhesives available is required. Furthermore, design must require high surface finish and quality control performed very closely. And in most instances, the conversion from a mechanical fastener to an adhesive usually requires a considerable larger surface area of jointing ( 9 ,10-13).

So why use adhesives one might ask? Some adhesives today are now capable to cover temperature ranges from -55oC to 350oC with service life of 60 000 hours or 20 years (4, 42). Furthermore, there are several beneficial reasons why adhesives may be preferred over conventional joining processes. For instance, when comparing to welding, adhesive joints do not distort the part close to the bonding area and does not leave any surface discoloration’s, which in turn may require further grinding and then painting. The most notable advantage is the possibility to join dissimilar metals, which is impossible in welding due to a high variation in melting temperatures.

As for mechanical fasteners, the replacement with adhesives induces a reduction in overall weight and serves as a corrosion barrier between a joint made of two different materials. Since adhesives are also less stiff then most fasteners, they also serve as vibration dampers and can easily accommodate thermal expansion of the adhering joints. By replacing rivets with adhesives in structural components, it is also possible to eliminate the stress concentrations formed near rivet holes and therefor prevent unforeseeable stress cracks, which may lead to disastrous failures. In an ergonomic point of view, adhesives do not protrude from their assemblies and go virtually unnoticeable and offer great characteristics in aerodynamic applications ( 9, 9).

Although the alternative of opting for an adhesive joint might be appealing in some circumstances, the economics involved can be quite complex. In general, adhesives are less expensive than a welding or fastening procedure. However, the implementation of adhesives in a mass production might prove to be quite expensive when taking for account the surface preparation requirements, the curing times and temperatures and the expertise needed to evaluate and control these processes. However, many companies have established major savings by using adhesives instead of other methods. The Northrop Aircraft Company stated that their conventional riveting operation of fabricating trailing wing sections cost them closely to1312$ where as obtaining similar strengths by using adhesives cost them 149$ per wing (3, 171).

In addition, the use of adhesives permitted the use of 0.020in thick aluminum sheets instead of the 0.051in sheets minimum requirements for rivets. Hence savings in money and weight ( 9, 5).

Adhesives most important contribution to the automotive industry came in the early 50’s when it replaced the rivets used to hold the brake linings to the shoe. This allowed for a far greater life of the brakes as they could know be run down all the way down to the show, instead of at the rivet heads. Also, created no distortion in the lining due to riveting, created better heat dissipation and reduced the risk of brake failure.

Although many new applications have arisen, they do not contribute an important saving to the automobile producer. Welds are still very present and so are mechanical fasteners due to the requirements of mass production, which can not permit itself of stopping the production line in order to let the structural adhesives cure. However, most of the final assemblies such as the trimmings, the side panel guards, the window rims and other sealed surfaces are joined by adhesion just prior to painting such that when the automobile must be put in an oven for the paint to cure, the adhesives cure also. Some manufacturers do use adhesives to fix the top gears of the transmission due to their low torque capabilities, namely Renault, and the arrival of vehicles made of composite material panels have created the need for an increase in adhesive joints (5, 63-65)

The reason why adhesive technology has developed so much is surely due to this industry in which adhesives plays a crucial role. A typical Boeing 747 is composed of over 1300m2 of adhesive material. The entire fuselage is covered by an adhesive film, which helps in the aerodynamics and the acoustic dampening of the vehicle. Furthermore, apart from the hundreds of sealed joints where adhesives can be found, critical structures such as wing sections, thrust reversers, walking panels, elevators, doors and flaps to name some, are all composed of high resistance, light weight, good fatigue and high acoustics dampening honeycomb structures which can only be assembled with high strength adhesives (8, 258). Up until date, not one adhesive failure has ever been directly linked to a fallen airplane (9, 5) .Helicopter blades consist of plate-to-plate type adhesive bonds which make for a better, more aerodynamic and certainly safer joint then with rivets, which where know to fracture off (4, 44)

As for space travel, no mission in space would have ever been possible without the use of high strength and temperature ranging adhesives which are required to mount the heat shields on the shuttles under side which protect it from flaming up on re-entry into the atmosphere ( 9, 7).

As the cost of life increasingly becomes more expensive, especially when considering the high fuel prices of today, it is no wonder why manufacturers of transportation vehicles try to optimize their product in order to somehow turn out a profit. Some factors, such as weight and drag reduction, may help in turning in some savings, without compromising the overall safety of the consumer. Adhesives have helped alleviate the problem and this can be seen on such a wide scale that the adhesive industry has grown considerably over the years, an estimated 20% increase in production annually (3, 1). And as more composite materials make their appearance and become economically more feasible, so will the appearance of vehicles which will entirely be made of these plastics and will most certainly contain numerous bonded joints which can only be achieved threw adhesives. These days are certainly not far out of reach.

Bibliography:

1.Dr. Jack W. Chaplin, Metal Manufacturing Technology, 1976, McKnight Publishing Company, Bloomington, Illinois, TS 205 C45, Concordia University Librairy.

2.Lawrence E. Doyle, Manufacturing Processes and Materials for Engineers, 3rd edition, 1985, Prentice-Hall Inc., Englwood Cliff, New Jersey, TS205 D64, Concordia University Librairy.

3.Roy A. Lindberg, Norman R. Braton, Welding and Other Joining Processes, 1976, Allyn and Byron Inc., Boston, TS 227 L58, Concordia University Librairy.

4.J. Hamer, Engineering Applications of Adhesives, 1988, Butterworths, London,UK, TP 968 E53, Concordia University Librairy.

5.E. Lawley, Engineering Applications of Adhesives, 1988, Butterworths, London,UK, TP 968 E53, Concordia University Librairy.

6.E. Paul De Garno, J.T. Black, Ronald A. Koltser, Materials and Processes in Manufacturing, 4th edition, 1997, Prentice-Hall Inc., Upper Saddle River NJ.

7.W.A. Lees, Adhesives in Engineering Design, 1984, Springer-Verlag, London,

TA 455 A 34L 44, Concordia University Librairy.

8.D.M. Brewis, D. Briggs, Industrial Adhesion Problems, 1985, Orbital Press, Oxford,

TP 968 I52, Concordia University Librairy.

9.Charles V. Cagle, Adhesive Bonding Techniques and Applications, 1968, McGraw-

Hill Book Company, South El Monte, California, TP 968 C3, Concordia University Librairy.

10. http://www.loctite.com/literature/design_metal.html” The Loctite Design Guide for Bonding Metals, Loctite Corporation, 2001.

Administration in Healthcare Services HSA 320

Memorial Awaiting

Colorado Technical University

Administration in Healthcare Services HSA 320

Several components go into making an organization run effectively and efficiently. One of the many components requires managers to manage teams during projects or changes within the organization. In the healthcare industry running of teams or employees is even more imperative to running in an effective and efficient manner because they are dealing with the lives and health of patients.

There are times when an employee is not performing to the standards of the organization or facility, and corrective action needs to be taken to get the employee performing at the standards set forth by the facility. Corrective action is used within organizations with the purpose of identifying and eliminating causes of a problem by: correcting, molding, or improving performance or behavior that is job-related CITATION Ind10 l 1033 (Indiana University Purdue University Indianapolis, 2010). A Corrective Action Plan allows facilities to take the necessary steps of action to correct the problem of performance. The goal of the corrective action plan is to discover what is causing the employee to have performance problems and give that employee a chance to correct this performance problem before taking the final step in the termination of the employee. The first step of the corrective action plan will be counseling of the employee. The next step in the corrective action plan would involve a written reprimand. The third step is suspension of the employee without pay. The last step in the corrective action plan is the termination of the employee CITATION Uni07 l 1033 (University of New Hampshire, 2007).

Communication has always been a vital component to an organization running effectively and effectively. Poor communication can be the determining factor that can bring an organization to its knees. Communication is also vital during changes within the facility or organization, so that the change will have minimal negative effective. This change can be in the form of implementing an EHR system. There are different types of communication we use, such as verbal and non-verbal. Using these different types of communication during change can ease the transition of the change. Change is an automatic switch for some people. People in general fear the unknown and this is what change brings; the unknown. Communication before and during an EHR system implementation can help answer employees questions, calm employees fears, and keep them focused and motivated CITATION Cro12 l 1033 (Crosnick, 2012). The key during this implementation is to be patient and supportive. Your employees are trying to deal with this change while fulfilling their job responsibilities. Let them know that you are going to be there to provide support, encouragement, and even gratitude during this stressful time.

Organizational charts provide employees a physical structure of the organization. Employees need to know whom they are reporting to if a problem should arise. Without a formal organizational structure, employees may find it difficult to know whom they officially report to in different situations, and it may become unclear exactly who has the final responsibility for what. In essence, an organizational structure gives guidance to employees by laying out the relationships that essentially govern the organization’s workflow.

Our mission at Memorial Awaiting is to provide and deliver healthcare services of high quality, integrity, and compassion to the members of the community. Our values are to assure a continuous quality of improvement, while providing excellent services to our patients and staff. Our values also include recognizing and valuing the members of the community, recognize a patient’s basic rights to respect, privacy, dignity, understanding, regardless of their spiritual beliefs. We vow to manage all fiscal responsibility with high integrity while meeting our charitable responsibilities as well.

The types of services offered at Memorial Awaiting include Heart and Vascular Services, a Cancer Center, Birthing Center and Maternity Services, Pediatric, and 24-hour Emergency Services. Memorial Awaiting is a licensed facility that has 350 beds and offer services as inpatient or outpatient. Our staff consists of 250, combining clinical staff and non-clinical staff. Our clinical staff consists of physicians, physician’s assistants, nurse, and medical assistants. Our non-clinical staff includes health care managers, health technologists, administrative and administrative support services. We will several departments located within the facility such as, Human Resources, Billing, and an IT team.

Even though each of these services and departments will function differently from one another, communication between these departments and the staff will be heavily relied upon in order to effectively and efficiently deliver health care services that match our mission and values.

References

BIBLIOGRAPHY l 1033 Crosnick, M. (2012). EHR Implementation Process Requires Communication. Retrieved from HITECH: http://www.hitechanswers.net/ehr-implementation-process-requires-communication/

First Insight. (2013). Successful EHR Implementation: It’s More About “How You Manage People” . Retrieved from http://www.first-insight.com/downloads/Successful-EHR-Implementation-It’s-About-Managing-People.pdf

Healey, B., & Marhese, M. (2012). Foundations of Health Care Management Principles and Methods. San Francisco: Wiley.

Indiana University Purdue University Indianapolis. (2010). Corrective Action: A Supervisor’s Guide to Managing Performance. Retrieved from http://hra.iupui.edu/content/doclib/ProgressiveDisciplineGuide.pdf

University of New Hampshire. (2007). Performance Management Toolkit – Constructive Discipline, Corrective Action & Documentation. Retrieved from http://www.unh.edu/hr/sites/unh.edu.hr/files/pdfs/constructive-discipline-and-corrective-action.pdf

Mores, laws and folkways

Mores, laws and folkways

Societal norms which include mores, laws, taboos and folkways are agreed upon rules and expectations that an individual is supposed to observe and behave according to in a given culture. Norms vary from one culture to another, some thing might be considered as a norm in one culture and in others it is not (Macionis, 2009). For example, shaking hands as a form of greeting in most of the African country shows a lot of respect. Whereas, in Asian countries you are not supposed to shake hands with your elders as a form of greeting

Folkway is said to be socially learned behaviours that are looked upon but which do not necessarily convey any moral significance. These are norms that help individuals interact with the other members of the society towards a harmonious living. Folkways for individual cultures arise from continuous repetition of an act that helps in the shaping of human behaviour. Unlike like is the case with other societal norms, the defiance of folkways carries no serious consequences. A common folkway is the dress codes adopted in different regions and countries (Pauer-Studer, 2008). Muslims dress in Hijabs and long dresses as a folkway but if a Muslim decides to dress in a short dress, no moral rule or laws are broken (except in strict sharia nations maybe).

Mores are significant norms that govern the right or wrong and control the behaviour of an individual. They are not necessarily written set rules to govern an individual but are behaviours that are generally accepted and what society follows in day to day life. Religious rules are example of mores (Macionis, 2009). Catholic clergy are nether expected to break their chastity vows nor are they supposed to get into matrimony and when they behave in a way contrary to this dire consequences are met on them, including excommunication from the society.

Laws are well raid down set of rules that have to be observed and enforced by law officials. Violation of these norms leads to prosecution in law courts. Driving while drunk is an offence which will land you in jail or be fined for violating that law.

When using your mobile handset in a public place you should not shout, level your voice such that you will not be disturbing the others. Shouting over the phone will be violating the folkway. When you violate that norm you feel you are not conforming to the normality of the society On the other hand the people around you will despise you for your behaviour, some of whom will not tolerate your behaviour and try to stop or tell you to lower your voice.

Normative conduct theory is clearly shown in the above example where by the behaviour of talking loud might have been as result of two conflicting beliefs. This might be because one was thinking he/she is in a noisy surrounding and the person on the other end might not hear them. The surrounding people’s approval of situation about that particular behaviour shows how the individual should behave (Pauer-Studer, 2008). Watching other person talk loud over the phone, a society member might pick up on the norm that they are supposed to talk loud in public places

Control theories exist due to lack of socialization, this leads to lack of self control as expressed in that example of speaking loudly over the phone. Individuals who are always overconfident of themselves will exhibit this behaviour and are more likely to violate folkway norms. Control theory considers the individual decision making being as the reason behind such behaviour (Pauer-Studer, 2008).

In conclusion we can say that society behaviour is directly dictated by the norms that are observed by it. That explains why we have different behaviours between different cultures as the norms are not the same.

References

Macionis, J. J. (2009). Society: The basics. Upper Saddle River, N.J: Pearson/Prentice Hall.

Pauer-Studer, H. (2008). Norms, values, and society. Dordrecht: Kluwer Academic Pub.

Cases where the president has taken the U.S. troops without congressional authorization

Cases where the president has taken the U.S. troops without congressional authorizationName:

Course:

Instructor

Date

Cases where the president has taken the U.S. troops without congressional authorizationUnder the constitution, the president has the power to veto legislations, command the armed forces, convene and adjourn congress, ask for the opinions on cabinet which should be written, grant reprieves and pardons, and receive and dismiss ambassadors. However, in the second paragraph of Article II, Section 2, the constitution provides that the President shall have Power, by and with the Advice and Consent of the Senate to make Treaties, provided two thirds of the Senators present concurs with the negotiations of the treaty in question. Furthermore, the president shall nominate, and by and with the advice and consent of the Senate, he shall appoint ambassadors, other public ministers and consuls, judges of the Supreme Court, and all other officers of the United States, whose appointments are not included in the mentioned categories above, and which shall be recognized by law. The president basically depends on the senate in making major decisions such as legislations. CITATION Art l 1033 (Article II ) The president’s power to take the U.S. forces into situations of hostility is limited under the constitution; however, since the founding of the republic, successive presidents have used military force without congressional authorization over two hundred times. This paper will focus on the cases in which the president has taken the U.S. troops into a foreign military situation without congressional Authorization and the legality of the president’s actions for each case presented.

Firstly is the quasi war between the United States of America and France between 1798 and 1800. John Adams was the president during this war which is viewed to have helped shape the American foreign policy. The American and the French government conflicted over the signing of a supposed peace establishing treaty with England. According to the French, this treaty would violate the 1778 Treaty of Alliance made with the Americans during the American Revolution. Amidst the mayhem, the American government also failed to make debt payments to the French on the basis that the current government was not the government that had signed the treaty. Following this, the French seized Americas merchant ships and upon intervention by the U.S. government the French made so much demands that America could not meet. The U.S. Navy went into war to protect America which was considered to be under attack. The president in this case was obliged to make a decision that favored America. The president’s actions were in line with the best interests of the nation which is legal. CITATION Kat17 l 1033 (Eschner, 2017)Secondly is the Utah Expedition between 1857 and 1858 which was basically an armed confrontation between the United States armed forces and the Mormon settlers in the Utah territory. This confrontation occurred during the time of President James Buchanan who attempted to use force with the Mormons in the Utah territory and ended up stirring a rebellion. American government was particular against the polygamy nature of the Mormons and considered it un-American like. Troops were sent in to install the typical American government and establish law and order. The president’s action was aimed at uphold law and order throughout its jurisdictions and the president was just doing his job which is substantially legal because that is what a ruler is expected to do. CITATION Bla18 l 1033 (Stilwell, 2018)Thirdly are the Indian wars which basically broke out because Indians acquired Christianity and civilization and thus became a threat to the Native Americans. The war was based on racism and religious backgrounds that disguised Indians as barbarians and child killers in the eyes of the Native Americans. The Indians on the other viewed George Washington as a town wrecker because the attack had been through his orders. The last war between the Indians and the American government happened in 1812 under the leadership of Andrew Jackson. In the Indian wars, the president had mobilized the troops to fight for the rights of the Native Americans which were then considered the right thing to do. A people of a different race could not have possible been allowed to take away what belonged to the Native Americans. Legally, the president is obliged to protect the citizens from any kind of invasion within his jurisdiction. CITATION And09 l 1033 (Gardner, 2009)The other war is patriotic war of 1837 with Canada. The patriots who consisted of the Irish and United States citizens in the upper part of Canada and the United States were determined to detach the peninsula lying between the Michigan frontier and the Niagara frontier in Canada and append it to the United States. The patriots marched to make their demands which led to a plot to capture of the United States Arsenal at Dearborn and seizure of its arms. To contain this situation, the Michigan Militia was assigned to watch over Arsenal. More defenses were expended later since the frontier troubles increased. The president in this case acted to fulfill the law of maintaining order within its territories which is a legal thing to do since the patriots were cause unrest and even attacked a militia base in Michigan. CITATION The l 1033 (ThePatriot War)Lastly, the naval skirmishes in Sumatra in the 1830s; was about the American expeditions launched against pirates in Indonesia. The American traders who had established their trading links throughout the Far East faced threats which led to the making agreements with the local leaders. This happened during the time of Andrew Jackson and he was so upset upon hearing this news. In reaction, he sent out troops to ensure the American traders were safe during their business operations and this led to the first expedition. The president acted in order to protect its citizens which is utterly the right thing every ruler would do and also legal. CITATION Ant16 l 1033 (Vanner, 2016)In summary, as much as the president acted without authorization from the congress, his actions were utterly for the best to safeguard the interests of the United States. By expending the troops to war, the foreign policy was enhanced particularly in the case of the war with the French.

References

BIBLIOGRAPHY Akkad, O. E. (2017). American War. ‎Alfred A. Knopf.

Article II . (n.d.). Retrieved from Ineractive Constitution : https://constitutioncenter.org/interactive-constitution/articles/article-ii

Eschner, K. (2017, July 7). This Unremembered US-France ‘Quasi War’ Shaped Early America’s Foreign Relations. Retrieved from Smithsonian.com: https://www.smithsonianmag.com/smart-news/unremembered-us-france-quasi-war-shaped-early-americas-foreign-relations-180963862/

Gardner, A. G. (2009). The Indian War. Colonial Williamsberg .

Stilwell, B. (2018, September 19). That time Mormons accidentally went to war with the US Army . Retrieved from We Are the Mighty: https://www.wearethemighty.com/history/utah-mormon-war-with-army

ThePatriot War. (n.d.). Retrieved from Michigan Department of Military and Veterans Affairs: https://www.michigan.gov/dmva/0,4569,7-126-2360_3003_3009-16956–,00.html

Vanner, A. (2016, January 26). The US Navy’s Sumatran Expeditions 1832 & 1838 . Retrieved from Dawlish Chronicles: http://dawlishchronicles.blogspot.com/2016/01/the-us-navys-sumatran-expeditions-1832.html

Mormon. Sexuality is an area of life that brings on risk, with the potential for positive or negative outcomes, success or fa

Mormon

Sexuality is an area of life that brings on risk, with the potential for positive or negative outcomes, success or failure. This is no more or less true for adolescents. The important difference is that teens do not yet have well-developed risk assessment skills. As in any area of life, if we want teens to be psychologically healthy, we want to promote their learning. This also holds especially true for their sexuality. In our culture, sex is still viewed as a taboo subject. I am interested in teen sexuality and how I might raise a sexually healthy teen, because I have a teenage son.

One parental concern might be the influence of TV and music TV, on teens. Researchers have been investigating this idea. In, “What teens have to say about sex on TV and in music videos” by Scott Simon of Saint Paul Pioneer Press (06/02), he reports what Joseph Shapiro and a group of teens had to say. The Kaiser Family Foundation put groups of 12 –15 year old teens in a room to listen to what they had to say about the sexually explicit TV and music videos on TV today. Mr. Shapiro and Dr. Jane Brown observe these teens.

Dr. Jane Brown, of University of North Carolina, is studying how sex in the media affects teens. She argues that it is very apparent that the teens are developing strong senses of morality. Teens want to be good; they strongly desire to act appropriately. She theorizes that teen sexual attitudes are greatly influenced by the amount of TV they watch.

After the teens viewed a popular Britney Spears video, the teens shared similar opinions. They viewed the skimpily dressed singer, as she went from one male singer to another, grinding her way across the stage. They used words such as gross, nasty, and disgusting to describe Spears’ actions and her clothing. Shapiro and Brown observed that the teens were very judgmental about what they viewed on TV.

Next the teens watched a scene from a sitcom called “Clueless”. In the scene the actress was conversing about who was going to lose their virginity first. The teenage actress was clearly upset, that another teen peer was going to lose her virginity before her. It was perceived as cool to have sex. The actress was upset that her not-as-popular teen peer was going to have sex before her.

Following the clip, the focus group, commented. They felt that the message being sent was that sex is cool, that if they were not having sex, they should be embarrassed. They felt that it was humiliating that the other actresses were laughing at the teen that had not had sex. Berk speaks of the imaginary audience (page 375), that teens always see themselves as on stage. Teens are extremely self-conscious, and avoid embarrassment. Teens would go to great lengths to avoid humiliation, and this scene was clearly showing that. The actress would have rather had sex to avoid peer humiliation.

Later, the focus group discussed the scene from the sitcom targeted to 14 & 15 years old, called “Dawson’s Creek”. The scene was about two teens who were going to have sex for the first time. The teens were not naïve to realize that the TV show was setting up a ‘perfect’ scenario for the first romantic experience. They noticed that the TV show did not mention STD’s. Interestingly, they were not surprised. They commented, “Sex sells”. The teens were perceptive enough to know that TV is a business, and business means money.

Parents want to know, are kids more likely to have sex, if they watch TV? Researchers cannot answer that, exactly, but what they do say is, the more you see the same thing over and over again, the more likely you are to believe it. For instance, a teen girl may have never kissed a boy, but the message of how to do this, has been imprinted in her memory from repeatedly seeing it on TV. She can than model a kiss, and not even know where she learned it from.

In the article, “Teens first sex is at home”, USA Today (09/02), a survey showed that teens were having sex in their homes, or at their partners’ home. This comes as a surprise to many parents. It should not come as a surprise, with the arrival of puberty and hormonal changes, we see the increase of sexual activity. Berk reports that American parents give their children little guidance about sexual information, and that the parents do not converse about sex in the presence of teens (page 360). With teens watching Prime-Time TV and MTV with high sexual content, it is even more important to speak to our kids about sex.

Teens watch approximately 3 hours of TV today, and they see sex glamorized.

Teens are getting mixed messages, at school and at home they are told to stay away from sex. They are taught the dangers of sex, STD’s, AIDS, pregnancy. Peer pressure is at its highest during adolescence. Adolescents mirror their social and emotional environments. Berk teaches us about a cognitive distortion, called the personal fable (page 375). This is easily explained as the “not me” opinion of themselves. Teens get such inflated opinions of themselves they don’t ever think that bad thing can happen to them. TV does not include the dangers of the sexual behavior. Approximately, 50% of teens do not use contraceptives (page 361). Since teens have the highest rate of STD’s of any age group, and TV does not promote sexual education, this message could be extremely dangerous!

In the article, “Teens close to their mothers are less likely to have early sex, study shows” by Tom Majeski of the Saint Paul Pioneer Press (09/02), Majeski reviewed longitudinal studies focusing on the relationship between mothers and their teenage children. More than 5000 teens were followed for over a year. The studies show that the more involved a mother is in a teen’s life; the age of sexual activity is postponed.

Researchers also found that mothers that spoke with other parents influenced the delay in sex. They explain it as, the more you know what is going on around your teen, the more you can influence them positively. Since teens have not mastered combinatorial thinking, they may make the wrong decision. The more a teens’ parents are involved, the greater their awareness of their child’s decisions. This may make the teen more conscious of their actions, for fear of disappointing their parent.

The study showed that mothers were more uncomfortable talking to their daughters than to their sons about sex. Berk might explain this as gender typing (page 401). Society tends to be more relaxed with male sexuality. Society is very harsh on female sexuality, thus this may reflect the way a parent speaks to a teen. It seems that our society sends a message that it is okay for males to be having sex, but it clearly views teen females having sex, very negatively.

Joseph Plambeck of The Tribune wrote a similar article, “Teens who are close to mothers delay having sex, report says” (09/02). The study similarly stated that mothers who were close to their teenage children show a higher delay in sex, than those who were not. Again, the study agreed that the parental involvement with other parents was a strong influencer. The study stated that mothers needed to speak with their teens about their own values.

Education was an important factor stated Plambeck. An interesting finding was that girls whose mothers were college educated, where less likely to become sexually active. I find this interesting, since my son of 14, is actively watching his mothers’ college education.

Parental guidance is most influential, writes Daniel Wood of The Christian Science Monitor, in “Teens, Sex and the Power of Parents”(09/02). This is an overall consensus between all the articles chosen. The article states that when it comes to sex education and teens, along with parental involvement, the way parents speak to their children about sex is also highly important. Warm, open households are the most successful.

The study also says the sex education needs to start as early as the elementary level. That getting parents values into their children’s lives earlier was important. As mentioned earlier, the influence of TV brings sex into our children’s lives earlier and more explicitly, thus, the reason for earlier communication on sexual values. Parents who had high expectations of school, and also having stricter rules made a difference. Berk agrees that warm guidance and rules are positive, both, which are features of the ideal authoritative style of parenting (page 269).

The study reminds us that at this time when a teen is searching for autonomy and identity, parents tend to back off. As a teen is gaining a sense of individuality, the desire for their parents input is less welcomed. This is a crucial time to have a balance in the home. Wood, of The Christian Science Monitor, states that family meals could help bring a more harmonious environment. Erik Erikson refers to this the psychological conflict during these teen years, as identity versus identity confusion (page 390). Erikson said that successful outcomes early, lead to positive resolution.

Teens are battling to understand sex during a period when teenage sexuality is changing. An increasing number of teenagers in the United States have sexual intercourse. If we want adolescents to be sexually healthy, we have to promote their learning to act in their own best interests. With TV, and peer influences being stronger than ever, the need for parental involvement increases. Sexuality can be easier for all, if parents can become more aware of their teens sexuality, and are prepared to give them help or advise when needed. They can help their teen to develop the proper skills and awareness they need to make sexually healthy choices during adolescence.

Bibliography: